Free NSE6_FNC-9.1 Exam Braindumps (page: 5)

Page 4 of 12

An administrator wants the Host At Risk event to generate an alarm.
What is used to achieve this result?

  1. A security trigger activity
  2. A security filter
  3. An event to alarm mapping
  4. An event to action mapping

Answer(s): C



Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)

  1. CLI
  2. SMTP
  3. SNMP
  4. FTP
  5. RADIUS

Answer(s): A,C,E

Explanation:

FortiNAC Study Guide 7.2 | Page 11



An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?

  1. To deny access to only the production DNS server
  2. To allow access to only the FortiNAC VPN interface
  3. To allow access to only the production DNS server
  4. To deny access to only the FortiNAC VPN interface

Answer(s): B



Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)

  1. Authentication
  2. Network Access
  3. Endpoint Compliance
  4. Supplicant EasvConnect

Answer(s): B,C






Post your Comments and Discuss Fortinet NSE6_FNC-9.1 exam with other Community members:

NSE6_FNC-9.1 Discussions & Posts